Bill H.

Bill H. Email and Phone Number

Chinese Diplomatic, Information and Intelligence, Military and Economic Researcher @ Red Dragon 1949 // 紅龍1949年
Saint Paul, MN, US
Bill H.'s Location
Greater Minneapolis-St. Paul Area, United States, United States
Bill H.'s Contact Details
About Bill H.

Author: "21st Century Chinese Cognitive Warfare: 21世紀中國認知戰" - 2024https://www.amazon.com/21st-Century-Chinese-Cognitive-Warfare/dp/B0DD3GMV5T/Internationally recognized cyber intelligence subject matter expert, providing multi-cultural threat intelligence on global nation state cyber warfare attacks & information warfare initiatives. Clients include global 50 companies across all industries including healthcare, manufacturing, oil & gas, international defense, other governmental agencies (OGA) and cyber threat intelligence. - Achieved significant advanced cyber network security formal education & international field experience- Conducted numerous CLASSIFIED cyber, physical and social engineering threat & vulnerability assessments worldwide for a variety of commercial & other governmental agencies (OGA)- Developed & led cross functional cyber & information security teams in challenging environments- Extensive international experience & expertise covering all aspects of cyber & information security- Internationally registered white hat hacker - https://www.soldierx.com/hdb/Bill-H - Named one of “20 Cyber Policy Experts to Follow On Twitter” https://www.forbes.com/sites/richardstiennon/2014/04/07/20-cyber-policy-experts-to-follow-on-twitter/#640271bf6538

Bill H.'s Current Company Details
Red Dragon 1949 // 紅龍1949年

Red Dragon 1949 // 紅龍1949年

View
Chinese Diplomatic, Information and Intelligence, Military and Economic Researcher
Saint Paul, MN, US
Employees:
2
Bill H. Work Experience Details
  • Red Dragon 1949 // 紅龍1949年
    Chinese Diplomatic, Information And Intelligence, Military And Economic Researcher
    Red Dragon 1949 // 紅龍1949年
    Saint Paul, Mn, Us
  • Technology By Design, Llc
    Chief Threat Intellligence Officer
    Technology By Design, Llc Dec 2024 - Present
    Minneapolis, Minnesota, Us
    Chief Threat Intellligence OfficerStrategic Leadership • Develops and implements global threat intelligence strategy • Provides regular cyber and geopolitical threat updates to senior management • Assesses global threat trends and formulates long-term intelligence policies • Reports directly to CEO on intelligence mattersOperational Management • Oversees real-time threat detection and response mechanisms • Directs daily threat intelligence activities and data analysis • Conducts risk assessments and devises countermeasures • Synthesizes intelligence from multiple sources into unified threat picturesTeam Development • Leads and mentors threat intelligence professionals • Establishes intelligence standards and tradecraft • Enforces analytic standards based on industry best practices • Coordinates intelligence sharing between internal teamsExternal Engagement • Collaborates with government agencies and cybersecurity communities • Participates in information sharing initiatives • Maintains relationships with external intelligence partners • Represents organization in security forumsRisk Management • Evaluates emerging threats to organizational assets • Supports incident response operations • Provides actionable intelligence for risk reduction • Develops proactive threat mitigation strategies
  • Knowfar Institute For Strategic And Defence Studies (Kisds)
    Visiting Research Fellow
    Knowfar Institute For Strategic And Defence Studies (Kisds) Dec 2015 - Present
    Visiting Research Fellow at Knowfar Institute for Strategic and Defence Studies (KISDS)
  • Knowfar Institute For Strategic And Defence Studies (Kisds)
    專業軍事訓練信息交換 - 多文化環境下的聯合軍事計劃
    Knowfar Institute For Strategic And Defence Studies (Kisds) Apr 2018 - Apr 2018
    2 Day Course - 專業軍事訓練信息交換 - 多文化環境下的聯合軍事計劃
  • Knowfar Institute For Strategic And Defence Studies (Kisds)
    專業軍事訓練信息交換 - 打擊恐怖主義
    Knowfar Institute For Strategic And Defence Studies (Kisds) Apr 2018 - Apr 2018
    專業軍事訓練信息交換 - 打擊恐怖主義
  • Knowfar Institute For Strategic And Defence Studies (Kisds)
    中國平民網絡戰爭遊戲 - 中華人民共和國上海
    Knowfar Institute For Strategic And Defence Studies (Kisds) Nov 2017 - Nov 2017
    中國平民網絡戰爭遊戲 - 中華人民共和國上海
  • Knowfar Institute For Strategic And Defence Studies (Kisds)
    中國軍事網絡戰爭遊戲 - 北京,中華人民共和國
    Knowfar Institute For Strategic And Defence Studies (Kisds) Nov 2017 - Nov 2017
    中國軍事網絡戰爭遊戲 - 北京,中華人民共和國
  • Knowfar Institute For Strategic And Defence Studies (Kisds)
    Featured Instructor
    Knowfar Institute For Strategic And Defence Studies (Kisds) Dec 2015 - Dec 2015
    Featured Instructor - Japanese Cyber Warfare Evolution
  • United States Marine Corps
    Cyber Warfare Advisor
    United States Marine Corps Dec 2021 - Dec 2024
    Washington, Dc, Us
    Provide CLASSIFIED & UNCLASSIFIED warfighting support to forward deployed operational forces.
  • Red Dragon 1949
    International Field Experienced Cyber Warfare Officer & Independent Information Security Engineer
    Red Dragon 1949 Aug 2010 - Dec 2024
    Internationally recognized cyber intelligence subject matter expert, providing multi-cultural threat intelligence on global nation state cyber warfare attacks & information warfare initiatives. Clients include global 50 companies across all industries including healthcare, manufacturing, oil & gas, international defense, other governmental agencies (OGA) & cyber threat counter- intelligence activities.- Achieved significant advanced cyber network security formal education and international field experience- Conducted numerous CLASSIFIED cyber, physical and social engineering threat & vulnerability assessments worldwide for a variety of commercial & other governmental agencies (OGA)- Developed & led cross functional cyber & information security teams in challenging environments- Extensive international experience & expertise covering all aspects of cyber & information security- Internationally registered white hat hacker - https://www.soldierx.com/hdb/Bill-H - Named one of “20 Cyber Policy Experts to Follow On Twitter” https://www.forbes.com/sites/richardstiennon/2014/04/07/20-cyber-policy-experts-to-follow-on-twitter/#640271bf6538 Significant current international working experience, across a significant number of countries. Lived in & conducted business globally since 1979, currently consulting with multi-national corporations, foreign military intelligence, counter-intelligence and defense ministerial organizations regarding strategic mitigation of specific nation state & other computer network attacks (CNA) and computer network exploits (CNE); colloquially known as offensive & defensive cyber operations.
  • A Medical Device Manufacturer
    Cyber Threat Intelligence
    A Medical Device Manufacturer Oct 2018 - Oct 2022
    - Created a global cyber threat intelligence program focused on implanted cardiac medical devices- Created an adversary to allies program, embracing the independent security researcher world- Developed, maintained & exploited cyber threat intelligence relationships within international hacking community- Collected, curated & delivered daily, weekly & monthly cyber threat intelligence products & briefings
  • Information Systems Security Association - Uk Chapter (Issa-Uk)
    Opening Keynote Speaker
    Information Systems Security Association - Uk Chapter (Issa-Uk) Jun 2022 - Jun 2022
    London, Gb
    Opening Keynote Speakerhttps://www.eventbrite.co.uk/e/pitch-on-the-ship-2022-tickets-185728718597
  • Cybernow Summit (Cns)
    Day One Closing Keynote: China'S Use Of Computers As A Strategic Weapon System
    Cybernow Summit (Cns) May 2022 - May 2022
    CyberNow Summit (CNS)Day One Closing Keynote: China's Use of Computers as a Strategic Weapon Systemhttps://pheedloop.com/EVEYAJARDOOFM/site/home/
  • Bath Spa University
    Featured Foreign Military Cyber Warfare Speaker - People'S Republic Of China
    Bath Spa University Apr 2022 - Apr 2022
    Bath, Gb
    Featured Foreign Military Cyber Warfare Speaker - People's Republic of Chinahttps://www.bathspa.ac.uk/courses/pg-cyber-security/
  • Gisec Global
    Featured Speaker - International Cyber Warfare Concerns
    Gisec Global Mar 2022 - Mar 2022
    Dubai, Dubai, Ae
    Featured Speaker - International Cyber Warfare Concerns https://gisec.ae/Agenda2022.aspx?SeminarName=GOVERNMENT-STAGE
  • Utica University
    Adjunct Professor Critical National Infrastructures And National Security (Cyb 633)
    Utica University Jan 2018 - Mar 2022
    Instruct graduate students through practical international field experience and actionable information from real world activities, an emphasis on United States Critical National Infrastructures and National Security.
  • Utica College
    Adjunct Professor - Cyber Intelligence (Cyb 610)
    Utica College Aug 2017 - Mar 2022
    The Cyber Intelligence course (CYB 610) provides students with an in-depth analysis of cyber, information and the collective application of both concepts which are of significant importance to national security and pro-active defense in cyberspace. The CYB 610 course covers activities of intelligence, taxonomy of information elements, functional aspects of each intelligence category, national intelligence & international contextual production resources. CYB 610 also examines concepts of cyber terrorism and cyberwar and relation to cyber intelligence. Key concepts of counter-intelligence and cyberwar will be applied to socio-economic, military, political and strategic national defense. Key concepts of the course, listed above, will be an educational foundation for binary and field collection techniques critically important in today’s asymmetric binary battlefield environment.
  • Biohacking Village, Defcon
    Advisor
    Biohacking Village, Defcon Dec 2019 - Feb 2022
    Provide cybersecurity engineering advice, strategic advisory and serve as volunteer coordinator - If you want to attend a DEFCON Village with behind the scenes access please get in contact with me.https://www.villageb.io/I'll be at RSA 202 - an opportunity to experience the BioHacking Village and sign up for supporting this year's DEFCON initiative!
  • C0C0N 2021
    Featured International Speaker -Cyber Attacks & National Critical Infrastructure
    C0C0N 2021 Nov 2021 - Nov 2021
    Kochi, Kerala, In
    An Indian Hacking Conference - Cyber Attacks & National Critical Infrastructurehttps://india.c0c0n.org/2021/speakers https://india.c0c0n.org/2021/agenda
  • Hack In The Box (Hitb)
    Panel Moderator - Hack In The Box (Hitb) Abu Dhabi, United Arab Emirates
    Hack In The Box (Hitb) Nov 2021 - Nov 2021
    Kuala Lumpur, Wp, My
    Panel Moderator - Hack in the Box (HiTB) Abu Dhabi, United Arab Emirates38 Degrees Healthcare in Crisis https://www.youtube.com/watch?v=lsJ5RapxjJI@ Minute 2:34:57
  • Hack In The Box (Hitb)
    Featured Foreign Military Speaker
    Hack In The Box (Hitb) Nov 2021 - Nov 2021
    Kuala Lumpur, Wp, My
    Author and security tech professional, Bill Hagestad, returns to #HITBCyberWeek to discuss the evolving cyber threat landscape in the GCC and its potential impact on the region. Catch his talks on 24 and 25 November.Register today to attend his talk in-person or virtually: cyberweek.ae/2021/attend #CyberWeek #HITBConference #HackInTheBox #ADNEChttps://www.facebook.com/hackinthebox/
  • Cybereason
    Malicious Life Podcast: China'S Unrestricted Cyberwarfare Part 1 // Featured Podcast Malicious Life
    Cybereason May 2021 - Jul 2021
    San Diego, California, Us
    Malicious Life Podcast: China's Unrestricted Cyberwarfare Part 1 // Featured Podcast Malicious Life
  • Cybereason
    Malicious Life Podcast: China'S Unrestricted Cyberwarfare Part 2// Featured Podcast Malicious Life
    Cybereason May 2021 - Jun 2021
    San Diego, California, Us
    Malicious Life Podcast: China's Unrestricted Cyberwarfare Part 1 // Featured Podcast Malicious Life https://www.cybereason.com/blog/malicious-life-podcast-chinas-unrestricted-cyberwarfare-part-2?
  • Cybereason
    Malicious Life Podcast: China'S Unrestricted Cyberwarfare Part 3 // Featured Podcast Malicious
    Cybereason May 2021 - Jun 2021
    San Diego, California, Us
    Malicious Life Podcast: China's Unrestricted Cyberwarfare Part 3 // Featured Podcast Malicioushttps://www.cybereason.com/blog/malicious-life-podcast-chinas-unrestricted-cyberwarfare-part-2?
  • Https://Mc.Nato.Int/
    Featured Chinese Military Cyber/Information Operations Briefer
    Https://Mc.Nato.Int/ Jun 2021 - Jun 2021
    Featured Chinese Military Cyber/Information Operations Briefer https://mc.nato.int/
  • Atlantic Forum Spring Conference #Nato72
    Intelligence: China & Russia A Unique Look Closing Keynote Atlantic Forum Spring Conference #Nato72
    Atlantic Forum Spring Conference #Nato72 Apr 2021 - Apr 2021
    Intelligence: China & Russia a Unique LookClosing Keynote Atlantic Forum Spring Conference #NATO72 at Atlantic Forum Spring Conference #NATO72https://atlantic-forum.com/events/atlantic-forum-spring-conference-nato72
  • Nordhoff Technical University
    Guest Lecturer - China'S Use Of Computers As A Strategic Weapon System
    Nordhoff Technical University Apr 2021 - Apr 2021
    China's Use of Computers as a Strategic Weapon System
  • B-Sides Brisbane
    Opening Keynote Panel - Collaboration - The Secret Of Criminal Success
    B-Sides Brisbane Dec 2020 - Dec 2020
    Brian Hay (former Operational Commander, Fraud and Cyber Crime, QPS), Ret. Lt Colonel Bill Hagestad II (expert in Chinese Cyber Espionage), and Professor Jonathan Rusch (former US Dept of Justice and Chair of the Presidential Identity Theft Committee and Chair of the International Mass Marketing Fraud Working Group), for our keynote presentation on the secret of criminal success.https://bsidesbrisbane.com/pages/schedule.html#
  • 8.8 Ff.Aa. Computer Security Conference
    Locknote Speaker - 8.8 Ff.Aa. Computer Security Conference
    8.8 Ff.Aa. Computer Security Conference Oct 2020 - Oct 2020
    Locknote Speaker - 8.8 FF.AA. Computer Security ConferenceMilitary focused cybersecurity conference
  • Mind The Sec
    Keynote Speaker - Mind The Sec
    Mind The Sec Sep 2020 - Sep 2020
    Guerra Militar Cibernética Chinesa. Efeitos, Impactos e Consequências para a América do Sul DescriçãoDurante a palestra "Guerra Militar Cibernética Chinesa - Efeitos, Impactos e Consequências para a América do Sul", participantes vão aprender sobre os últimos desenvolvimentos em guerra cibernética, incluindo guerras sem limites (guerra irrestrita), iniciativas de informatização e onde a América do Sul se encaixa nos planos globais da República Popular da China.https://www.mindthesec.com.br/meetings/virtual/JzXNKteeeN6QxbrBo
  • Auscert
    Chinese Cyber Espionage - Auscert 2020
    Auscert Sep 2020 - Sep 2020
    Brisbane, Queensland, Au
    Chinese Cyber EspionageNB. This presentation will be Traffic Light Protocol RED, so please plan accordingly.Attendees will receive a field experience based journey into the heart of the People's Republic of China cyber espionage.Programs such as 863—National High-Tech Research and Development Plan <<863——国家高技术研究发展计划>> & the strategic diplomatic, intelligence,military and economic impacts on Australia will be reviewed.Bill will bring you face-to-face with Chinese military authors of "Unrestricted Warfare", Chinese hackers, and the tactical hacking techniques they have used to attack Canberra and Australia's national security.https://conference.auscert.org.au/speaker/bill-hagestad/
  • I-4
    Keynote Speaker
    I-4 Sep 2020 - Sep 2020
    Closing Keynote
  • Biohacking Village
    Defcon - Speech // Biohacking Village -Chinese Military Bio-Weapons Laboratory Mission: Op Covid-19
    Biohacking Village Aug 2020 - Aug 2020
    Washington, Dc, Us
    Chinese Military Bio-Weapons Laboratory Mission: OP COVID-19 // 中國軍事生物武器實驗室任務 結論…Conclusions…一个. Wuhan virus was not man made…两. Chinese researchers not so sure…Chinese commentary indicates military source三个. Chinese military response to Wuhan as epicenter…is curiously compelling四个. Consistent Communist Chinese rhetoric blames US DoD for virus五个. China is cooperating with Gulf Cooperation Council countries – e.g. United Arab Emirates… 六个. Chinese military used as test subject for anti-virus – notably no civilian use yet, perhaps Xinjiang七个. China redirecting virus source narrative towards US elections….八个. China optimistic about global leadership role in face of failing US
  • Bio-Hacking Village, Defcon
    Chinese Military Combined Arms Effects - Bio-Weapons
    Bio-Hacking Village, Defcon Aug 2019 - Aug 2019
    "Chinese Military Combined Arms Effects - Bio-Weapons" a field experience based discussion from within the People's Republic of China regarding the People's Liberation Army's use of bio-weapons.https://www.villageb.io/schedules
  • Middle Eastern Nation State Military Cyber Command
    Threat Operation Center (Toc) Manager, Middle Eastern Nation State Military Cyber Command
    Middle Eastern Nation State Military Cyber Command Apr 2018 - Sep 2018
    - Led a multi-national TOC Team comprised of 10 threat analysts in a Middle Eastern military cyber warfare center;- Architected, designed, engineered a foreign military threat operations center capability- Implemented a TOC architecture emphasizing a Malware Information Sharing Platform (MISP), a secure Intelligence Gathering Platform (IGP), Threat Intelligence Platform (TIP) and Threat Intelligence Library (TIL)- Advised, guided, & instruct foreign military cyber warfare cadre in passive & active threat intelligence collection- Led training instruction in identifying, research & exploit of active intelligence targets faced by a Middle Eastern military cyber warfare center- Developed an active & passive cyber threat intelligence program based upon MITRE's ATT&CK Matrix- Utilized ASCOPE, PMSEEII, DIME, Diamond methodologies to facilitate cyber warfare adversary threat situational awareness- Created a military environment cyber risk assessment methodology using CVSS v 3.0, OPSWAT RA & NIST SP 800-30 - Researched, designed, edited & wrote TOC concept of operations (CONOPs)- Researched, designed, edited & wrote Open Source Intelligence (OSINT) standard operating procedure (SOP)- Researched, designed, edited & wrote a 360-page TOC Standard Operating Procedure for use by a Middle Eastern military in the execution, collection & exploitation of both active & passive intelligence collection
  • Smiths Medical
    Senior Principal Cyber Security Engineer
    Smiths Medical Mar 2016 - Mar 2018
    Created, designed and functionally carried out a medical device cyber security engineering program within a medical device company with no budget and no team. Responsible for 15 distinct areas with pre-market & post-market cyber security engineering advisory, design within legacy and next generation network connected medical devices. Created, designed and implemented a rigorous cyber risk and vulnerability assessment methodology using the Food & Drug Administration Cyber Division suggested assessment methodologies based upon both the Common Vulnerability Scoring Subsystem (CVSS) Version 3.0 and NIST Special Publication 800-30 Revision 1.0 2012 Guide for ConductingRisk Assessments.Received an Innovator';s Excellence Award for designing this cyber risk assessment methodology.Recruited and created multi-disciplinary Cyber Security Engineering Tiger Team's to meet the demand for organizational cyber security engineering.Created, design and led cyber security war game table top exercises (TTX) for the FDA Cyber Division and brought competitor cyber security engineering teams together to collaborate, communicate and cooperate towards building cyber resilient standards for cyber security of medical devices all while ensuring patient safety.Received an Organizational Excellence Award for these Cyber War Game TTX industry events.
  • University Of Minnesota
    Mentor - College Of Science & Engineering
    University Of Minnesota Aug 2013 - Aug 2017
    Minneapolis And St. Paul, Minnesota, Us
    Provide mentorship to graduate students @ College of Science & Engineering.
  • University Of Minnesota
    Instructor - Security Technologies : Nation States Cyber Conflict
    University Of Minnesota Jun 2011 - Jun 2014
    Minneapolis And St. Paul, Minnesota, Us
    - Provide strategic focus on nation state cyber security to students;- Emphasis on international case studies related to cyber attacks, cyber espionage, data ex-filtration among others;- Descriptive teachings on international government use of cyber warfare to manifest policy;- Distinct case studies related to military use of information warfare (IW) to carry out governmental cyber war policies;- Cause and effect analysis of nationalistic use of computer hacking by civilians;- Second and third order effects of commercial entities using corporate cyber espionage; - Specific focus on the People's Republic of China, Taiwan, Hong Kong, Japan, North Korea and South Korea.
  • Utica College
    Featured Guest Lecturer - Chinese Internet Security & Cyber Sovereignty
    Utica College Jun 2017 - Jun 2017
    Featured Guest Lecturer - Chinese Internet Security & Cyber Sovereignty - Graduate level discussion based upon recent field experience within the People's Republic of China - an emphasis of the latest Communist Chinese Government Law & policy: 中國新的網絡安全法 // INTERNET SECURITY LAW OF THE PEOPLE ‘S REPUBLIC OF CHINA. Referring URL: http://www.reddragon1949.com/
  • Cyberspace Adminsitration Of China (Cac) // 中國網路管理委員會
    Featured Foreign Cyber Security Keynote Speaker // 中國大數據和網絡安全國際博覽會
    Cyberspace Adminsitration Of China (Cac) // 中國網路管理委員會 May 2017 - May 2017
    Featured Foreign Cyber Security Keynote Speaker China Big Data and Cyber Security International Expo // 中國大數據和網絡安全國際博覽會http://www.bigdata-expo.org/http://www.cac.gov.cn/
  • 軍事合作 - 人民解放軍 // Military Cooperation - People'S Liberation Army (Pla)
    Featured Keynote Speaker - Knowfar Institute For Strategic And Defence Studies (Kisds)
    軍事合作 - 人民解放軍 // Military Cooperation - People'S Liberation Army (Pla) Jan 2017 - Jan 2017
    UNCLASSIFIED簡報作為與人民解放軍(PLA)軍隊合作的一部分,由Knowfar戰略和國防研究所(KISDS)在中國上海和北京,中華人民共和國UNCLASSIFIED Briefings as part of Military Cooperation with People's Liberation Army (PLA) sponsored by Knowfar Institute for Strategic and Defence Studies (KISDS) in both Shanghai and Beijing, People's Republic of China
  • Nato Cooperative Cyber Defence Centre Of Excellence (Ccdcoe)
    Instructor
    Nato Cooperative Cyber Defence Centre Of Excellence (Ccdcoe) Dec 2015 - Apr 2016
    NATO - SECRET
  • Cyphercon
    Keynote Speaker - China'S Hackers And Cyber Sovereignty
    Cyphercon Mar 2016 - Mar 2016
    Keynote Speaker - China's Hackers and Cyber Sovereigntyhttp://cyphercon.com/
  • Red Dragon Rising Publishing
    Information Security Information Researcher
    Red Dragon Rising Publishing Aug 2011 - Mar 2016
    Current recent publications include:August 2015: Chinese Cyber Crime: China's Hacking UnderworldFebruary 2014: "China’s Plans for Winning Information Confrontation"​...ISBN-13: 978-1496080875January 2014: "Chinese Information Warfare Doctrine Development"​ 1994 - 2014...ISBN-13: 978-1493771974 2013: "China's Use of Computers & Networks as a Weapon System" ...ISBN: 978-1482577105
  • Red Dragon Rising Publishing
    Chief Cyber Security Strategist |Author |Speaker |Blogger|
    Red Dragon Rising Publishing Jun 2001 - Apr 2013
    Provide consultation in these distinct cyber areas of emphasis:- Cyber-crime Investigation and Response- Incident Handling & Response- Penetration TestingFocused specialties include:- Red Teaming - physical and cyber- Digital Forensic Profiling and Social Engineering- Unconventional Nation State Cyber-Attack Vectors Extensive experience in physical facility anti-terrorism and force protection vulnerability identification and mitigation
  • Reddragon1949
    Strategic Information Security
    Reddragon1949 Jul 2011 - Mar 2016
    A simple author focusing on the Strategic Chinese Cyber Infiltration of commercial entities, primarily global 50 in size & scope; international governments, their intelligence, law enforcement & military organizations. Providing these critically important entities with substantive facts and actionable intelligence. Assisting with understanding how simple computer compromises are made using Mandarin, Simplified & Literary forms of the Chinese language.
  • Smiths Medical
    Senior Principal Cyber Security Engineer
    Smiths Medical 2016 - 2016
    San Clemente, California, Us
  • Cyberspace Administration Of China
    World Internet Conference (Wic)
    Cyberspace Administration Of China Dec 2015 - Dec 2015
    World Internet Conference (WIC), Cyberspace Administration of China
  • Computer Measurement Group (Gmg)
    Featured Speaker - “China Cyber Soverignty & Impact On Big Data”
    Computer Measurement Group (Gmg) Nov 2015 - Nov 2015
    Featured Speaker- “China Cyber Soverignty & Impact on Big Data”
  • International Information Integrity Institute I-4
    Keynote Speaker
    International Information Integrity Institute I-4 Oct 2015 - Oct 2015
    CONFIDENTIAL - NOFORN
  • Paragon Development Systems (Pds)
    Keynote Speaker
    Paragon Development Systems (Pds) Oct 2015 - Oct 2015
    Oconomowoc, Wi, Us
    Keynote Speaker - “The Future of Chinese Cyber Warfare” . . . They would never hack my enterprise . . . would they?
  • Trend Micro Cloudsec 15
    Book Signing & Speaker: 21St Chinese Cyber Sovereignty
    Trend Micro Cloudsec 15 Sep 2015 - Sep 2015
    Tokyo, Japan, Jp
    Trend Micro CLOUDSEC 15Book Signing: Global Launch: Chinese Cyber Crime http://www.amazon.com/Chinese-Cyber-Crime-Hacking-Underworld/dp/1492985252Speaker: 21st Chinese Cyber Sovereignty Field experience-based and very current perspective of Chinese Cyberspace. An introduction and review of China's new national security law and draft cyberspace sovereignty legislation.
  • The Fraud And Cyber Crime Group, Queensland Police Service
    Keynote Speaker - Nation State Motivations For Cyber Espionage
    The Fraud And Cyber Crime Group, Queensland Police Service Aug 2015 - Aug 2015
    Keynote Speaker - Nation State Motivations for Cyber Espionage, 2015 Fraud & Cyber Crime Symposium,
  • National Defense Academy (防衛大学校)
    Featured Guest Speaker
    National Defense Academy (防衛大学校) Jun 2015 - Jun 2015
    Featured Guest Speaker - National Defense Academy (防衛大学校)
  • Computer Management Group - Minneapolis Chapter
    Opening Keynote Speaker
    Computer Management Group - Minneapolis Chapter Jun 2015 - Jun 2015
    Opening Keynote Speaker - Comparative Discussion of Nation State Cyber Doctrine Development
  • Ctc Technology Corporation
    Keynote Speaker: Information Warfare In Asia
    Ctc Technology Corporation Jun 2015 - Jun 2015
    Keynote Speaker: Information Warfare in Asiahttp://www.mod.go.jp/index.html
  • Knowfar Institute For Strategic And Defense Studies
    Keynote Speaker - Isis Use Of Cyber Warfare
    Knowfar Institute For Strategic And Defense Studies May 2015 - May 2015
    Keynote Speaker - ISIS Use of Cyber Warfare
  • Knowfar Institute For Strategic And Defense Studies
    Keynote Speaker - Comparative Cyber Doctrine Development
    Knowfar Institute For Strategic And Defense Studies May 2015 - May 2015
    Keynote Speaker - Comparative Cyber Doctrine Development
  • Knowfar Institute For Strategic And Defense Studies
    Featured Foreign Keynote: Anti- & Counter Terrorism Efforts During The New Great Game
    Knowfar Institute For Strategic And Defense Studies May 2015 - May 2015
    Featured Foreign Keynote: Anti- & Counter Terrorism Efforts During the New Great Game
  • Illinois Institute Of Technology
    Keynote Speaker - Forensecure '15
    Illinois Institute Of Technology Apr 2015 - Apr 2015
    Chicago, Illinois, Us
    Keynote Speaker - FORENSECURE '15Binary Battlefield: Nation State Motivations for Cyber Actions, a discussion about real world field research vis-a-vis front line experiences from international motivations of cyber-enabled nation states including China, Iran, and Russia and the impact on your digital information world.
  • The Johns Hopkins University Applied Physics Laboratory
    Distinguished Speaker Jhu - Apl Colloquium
    The Johns Hopkins University Applied Physics Laboratory Apr 2015 - Apr 2015
    Laurel, Maryland, Us
    Distinguished Speaker JHU - APL Colloquium
  • Command & Staff College, Marine Corps University, United States Marine Corps
    Featured Speaker: Chinese Military Cyber Capabilities
    Command & Staff College, Marine Corps University, United States Marine Corps Apr 2015 - Apr 2015
    Featured Speaker: Chinese Military Cyber Capabilities
  • Norse Corporation
    Cyber Threat Intelligence Researcher - Islamic Republic Of Iran
    Norse Corporation Jul 2014 - Apr 2015
    Foster City, Ca, Us
    Cyber Threat Intelligence Researcher - Islamic Republic of IranGhost writer for cyber threat intelligence report pertaining to Iran.
  • University Of Wisconsin-River Falls
    Analyzing Nation State Cyber Warfare - Russia, Iran & North Korea
    University Of Wisconsin-River Falls Mar 2015 - Mar 2015
    River Falls, Wi, Us
    Featured Guest Speaker - Analyzing Nation State Cyber Warfare - Russia, Iran & North Korea
  • University Of Wisconsin-River Falls
    Featured Speaker - Evolution Of Chinese Cyber Capabilities
    University Of Wisconsin-River Falls Mar 2015 - Mar 2015
    River Falls, Wi, Us
    Featured Speaker - Evolution of Chinese Cyber Capabilities giving an economic, military and political review of the People’s Republic of China.
  • Saudi Aramco
    Cyber Threat Intelligence
    Saudi Aramco Mar 2015 - Mar 2015
    Dhahran, Sa
    Cyber Threat Intelligence
  • International Information Integrity Institute I-4
    Keynote Speaker
    International Information Integrity Institute I-4 Mar 2015 - Mar 2015
    CONFIDENTIAL - NOFORN
  • Lions Clubs International
    Featured Speaker - 2015 Cyber Intelligence Briefing - People'S Republic Of China
    Lions Clubs International Jan 2015 - Jan 2015
    Oak Brook, Illinois, Us
    Featured Speaker - 2015 Cyber Intelligence Briefing - People's Republic of ChinaSupporting my local business community regarding cyber education and impact on national security
  • S4X15 Digital Bond
    Featured Speaker - Why China Or Iran Would Target Us National Critical Infrastructure (Nci)
    S4X15 Digital Bond Jan 2015 - Jan 2015
    Featured Speaker - Why China or Iran Would Target US National Critical Infrastructure (NCI)…Chinese & Iranian Compromises of US National Critical Infrastructurehttp://www.digitalbond.com/s4/s4x14/
  • S4X15 Digital Bond
    Panelist - Cyber Warfare Attribution/Retribution - Rendition
    S4X15 Digital Bond Jan 2015 - Jan 2015
    One of three paneslists discussing cyber warfare - Attribution/Retribution - Rendition
  • A British Conference Producer
    International Cyber War Games Duty Expert - Scenario Adjudicator
    A British Conference Producer Jan 2015 - Jan 2015
    International Cyber War Games Duty Expert - Scenario Adjudicator
  • A British Conference Producer
    Conference Chairman - Cyber Defence And Network Security (Cdans)
    A British Conference Producer Jan 2015 - Jan 2015
    Third consecutive year as Conference Chairman - Cyber Defence and Network Security (CDANS)
  • A British Conference Producer
    Featured Speaker
    A British Conference Producer Dec 2014 - Dec 2014
    NEW THREATS TO GCC CYBER SECURITY: UNCOVERING REGIONAL VULNERABILITIES AND AN ANALYSIS OF THOSE WHO WOULD EXPLOIT THEM
  • A British Conference Producer
    Interactive Workshop Leader
    A British Conference Producer 2014 - Dec 2014
    Interactive Workshop: UNDERSTANDING AND DEFENDING AGAINST EMERGING CYBER THREATS
  • Nask
    Featured Speaker Secure 2014
    Nask Oct 2014 - Oct 2014
    Warszawa, Mazowieckie, Pl
    Featured Speaker SECURE 2014Comparative Analysis of Chinese & Russian Criminal Cyber ​​Hacking Initiativeshttp://www.secure.edu.pl/prelegenci.php
  • Knowfar Institute (A Chinese Defence Think Tank)
    Featured Briefer: Anti & Counter-Terrorism Lessons For The People'S Republic Of China
    Knowfar Institute (A Chinese Defence Think Tank) Sep 2014 - Oct 2014
    Featured Briefer: Anti & Counter-Terrorism Lessons for the People's Republic of China
  • Central Military Commission (Oga)
    Featured Briefer: Cyber Conflict
    Central Military Commission (Oga) Sep 2014 - Oct 2014
    NOFORNRecognized by the People's Republic of China as the most knowledgeable and influential foreign expert on China's Military Information Warefare initiatives...October 2014
  • Tel Aviv University - 4Th Annual International Cybersecurity Conference
    Featured Speaker
    Tel Aviv University - 4Th Annual International Cybersecurity Conference Sep 2014 - Sep 2014
    Tel Aviv, Il
    Featured SpeakerTel Aviv University - 4th Annual International Cybersecurity Conference
  • Society Of Former Special Agents Of The Fbi, Inc.
    Featured Guest Speaker
    Society Of Former Special Agents Of The Fbi, Inc. Sep 2014 - Sep 2014
    Featured Guest Speakerhttp://www.socxfbi.org/
  • Ministry Of Foreign Affairs Of Israel
    Noforn
    Ministry Of Foreign Affairs Of Israel Sep 2014 - Sep 2014
    Jerusalem, Il
    NOFORN
  • Security B-Sides Msp
    Opening Keynote Speaker
    Security B-Sides Msp Aug 2014 - Aug 2014
    Minneapolis, Mn, Us
    Opening Keynote Speaker
  • Australian Institute Of Professional Intelligence Officers (Aipio)
    Opening Keynote Speaker
    Australian Institute Of Professional Intelligence Officers (Aipio) Aug 2014 - Aug 2014
    Opening Keynote Speaker for Annual Australian Institute of Professional Intelligence Officers (AIPIO) Conference
  • Unspecified Oga
    Confidential - Noforn
    Unspecified Oga Jun 2014 - Jul 2014
    CONFIDENTIAL - NOFORN
  • Australian Computer Society
    Featured Presentation: Chinese Cyber Espionage: Fact Or Friction For Australia'S Cyber Health
    Australian Computer Society Jun 2014 - Jun 2014
    Sydney, Nsw, Au
    Featured Presentation: Chinese Cyber Espionage: Fact or Friction for Australia's Cyber Health
  • Marine Corps Intelligence Activity (Mcia) - Quantico
    Foreign Military Cyber Doctrine Development
    Marine Corps Intelligence Activity (Mcia) - Quantico Jun 2014 - Jun 2014
    Provided an in-depth international research and operational experience based briefing on Foreign Military Cyber Doctrine Development with a special emphasis on the following countries Islamic Republic of Iran, Russian Federation and People's Republic of China.
  • Marine Corps Warfighting Laboratory
    Foreign Military Cyber Doctrine Development
    Marine Corps Warfighting Laboratory Jun 2014 - Jun 2014
    Provided an in-depth international research and operational experience based briefing on Foreign Military Cyber Doctrine Development with a special emphasis on the following countries Islamic Republic of Iran, Russian Federation and People's Republic of China.
  • International Information Integrity Institute I-4
    Keynote Speaker
    International Information Integrity Institute I-4 Jun 2014 - Jun 2014
    CONFIDENTIAL - NOFORN
  • Diplomatic Language Services
    Cyber Course Design
    Diplomatic Language Services May 2014 - Jun 2014
    Arlington, Va, Us
    Cyber Course Design
  • Wikistrat
    Senior Research Analyst
    Wikistrat Jan 2012 - Jun 2014
    Washington, District Of Columbia, Us
    Provide military, apolitical and analysis regarding a myriad of task oriented subjects across the entire global geo-political spectrum...
  • Positive Hack Days - Phd 2014
    Featured Speaker - Comparing China, Iran & North Korean Hacking Worlds
    Positive Hack Days - Phd 2014 May 2014 - May 2014
    Featured Speaker - Comparing China, Iran & North Korean Hacking Worlds
  • International Information Integrity Institute I-4
    Keynote Speaker
    International Information Integrity Institute I-4 Mar 2014 - Mar 2014
    CONFIDENTIAL - NOFORN
  • Secure Computing Forum 2014 -
    Keynote Speaker - People'S Republic Of China Cyber Conflict
    Secure Computing Forum 2014 - Mar 2014 - Mar 2014
    Keynote Speaker - People's Republic of China Cyber Conflict
  • Gcc Digital Security Forum
    Session Moderator - New Trends And Solutions For Digital Threats
    Gcc Digital Security Forum Feb 2014 - Feb 2014
    Session Moderator - New Trends and Solutions for Digital Threats A discussion about the current and emerging securing cyber threats as well as solutions and defense potentials in a global and Gulf context: Sources of threats and defense strategies Activities and institutions most vulnerable to penetration. Classical sources of threats and digital intrusions Cost of digital crimes Encryption, data centers, SCADA and other solutions Cloud Computing as a solution posing new threat
  • Gcc Digital Security Forum
    Session Moderator: Session 5: Approaches And Strategies For Major Industries In Gcc
    Gcc Digital Security Forum Feb 2014 - Feb 2014
    Session Moderator: Session 5: Approaches and Strategies for Major Industries in GCCEach presentation will highlight need and approach taken by major industries in cyber security. Industries to be addressed are: Critical Infrastructure, Banking and financial markets and telecommunications.
  • Information Systems Security Association - Mn Chapter
    Featured Speaker - Iranian Cyber Initiatives
    Information Systems Security Association - Mn Chapter Jan 2014 - Jan 2014
    Featured Speaker - Iranian Cyber Initiatives
  • Computer Defence & Network Security Conference 2014
    Featured Speaker:Comparative Study: Iran, Russia & Prc Cyber Doctrine
    Computer Defence & Network Security Conference 2014 Jan 2014 - Jan 2014
    Featured Speaker:Comparative Study: Iran, Russia & PRC Cyber DoctrineNation State Motivations for Using the Cyber Realm – Comparative Study of Islamic Republic of Iran, Russian Federation & the People’s Republic of China (中華人民共和國).
  • Computer Defence & Network Security Conference 2014
    Conference Chair
    Computer Defence & Network Security Conference 2014 Jan 2014 - Jan 2014
    Conference Chair for Computer Defence & Network Security Conference 2014
  • Computer Defence & Network Security Conference 2014
    Featured Workshop: Chinese Cyber Criminals Tactics, Technology & Protocols
    Computer Defence & Network Security Conference 2014 Jan 2014 - Jan 2014
    Featured Workshop:Chinese Cyber Criminals Tactics, Technology & Protocols(21st Century Cyber TTPs)Key Learning Point #1 –Chinese Cyber Criminals - Tactics, Techniques & Procedures (TTPs)Key Learning Point #2 –Direct Cyber Security Threat Impact by Chinese Cyber CriminalsKey Learning Point #3 –Operational picture & CONOPS of Chinese Cyber Underground
  • Acumin Consulting
    Featured Rant: How China'S Strategic Use Of Comprised Computer Systems Has Colonised Britain
    Acumin Consulting Jan 2014 - Jan 2014
    London, Gb
    Featured RANT: How China's Strategic Use of Comprised Computer Systems Has Colonised BritainFor the frst RANT Forum of 2014 William Hagestad II, Author & International Cyber Threat Researcher, will be presenting his talk, "How China's Strategic Use of Comprised Computer Systems Has Colonised Britain."In this presentation LtCol Hagestad will discuss the Chinese economic, military and political colonisation of Britain through the strategic use of compromising networks and computers systems as part of the People's Republic of China's non-military invasion of the United Kingdom...
  • Minnesota Government It Symposium
    Featured Speaker: Op Middle Kingdom: How China Uses Networked Computer Systems To Hack
    Minnesota Government It Symposium Dec 2013 - Dec 2013
    Featured Speaker: OP Middle Kingdom: How China Uses Networked Computer Systems to HackSecurity Track — Level: AdvancedOP Middle Kingdom: How China Uses Networked Computer Systems to HackWilliam Hagestad II, International Author & Speaker, Red Dragon Rising - People's Republic of Chinese Strategic Cyber Infiltration Tactics, Techniques & ProceduresThis session will address the following: 1) "China Challenges: Target ~ United States: People's Republic of China’s use of Computers and Networks as a Strategic Weapon;" 2) Facts of Chinese history of cyber risk and economic reward as it directly applies to the United States, and 3) Fundamental elements of the Official Communist Party, People’s Liberation Army and their direct involvement in Chinese commercial enterprises.In this session, you will learn:Latest cyber threat intelligence impacting US government and commercial interestsDark world of the Chinese hacker community - learn what they are using to hack our organizationsFrom other like-minded professionals who will ask questions related to the security of their enterprise from foreign cyber hacking & espionage
  • Ground Zero Summit
    China Challenges: Target India – People’S Republic Of China Targeting India
    Ground Zero Summit Nov 2013 - Nov 2013
    China Challenges: Target India – The People’s Republic of China use of computers & networks as a strategic weapon.
  • Ground Zero Summit
    Foreign Panelist: Panel Discussion On Surveillance, Privacy & Cyber Espionage
    Ground Zero Summit Nov 2013 - Nov 2013
    Foreign Panelist: Panel discussion on surveillance, privacy & cyber espionage in wake of PRISM
  • Century College
    Guest Speaker ~ Islamic Republic Of Iran Cyber Warfare
    Century College Nov 2013 - Nov 2013
    White Bear Lake, Mn, Us
    Guest Speaker ~ Islamic Republic of Iran Cyber Warfare
  • It Governance
    Internationally Published Author: 21St Century Chinese Cyberwarfare
    It Governance Apr 2011 - Nov 2013
    Ely, Cambridgeshire, Gb
    Understand 21st Century Chinese Cyber Warfare and Confront the Red DragonOrder now at either:Option # 1) http://red-dragonrising.com/Option # 2) http://www.amazon.com/21st-Century-Chinese-Cyberwarfare-Governance/dp/1849283346ISBN: 9781849283342Pages: Circa 364Format: PaperbackPublished date: March 2012Availability: NOW - currently available
  • Xvii Conference On Telecommunications And It Security
    Featured Speaker: Operation Middle Kingdom
    Xvii Conference On Telecommunications And It Security Oct 2013 - Oct 2013
    Featured Speaker @ SECURE 2013Operation Middle Kingdom. People's Republic of China: Use of the Computer as a Strategic & Economic Weapon Systemhttp://www.secure.edu.pl/en/index.php
  • Payments Council
    Keynote Speaker - Chinese Cybercrime History & Ttps: Impact On The United Kingdom
    Payments Council Oct 2013 - Oct 2013
    Keynote Speaker - eCrime and Cyber Security Seminar 2013 ~ Chinese Cybercrime History & TTPs: Impact on the United Kingdom
  • Confidential Icw Presidential Policy Directive/Ppd-21
    Chinese Cyber Infiltration: Us Critical Infrastructure Security And Resilience
    Confidential Icw Presidential Policy Directive/Ppd-21 Oct 2013 - Oct 2013
    Chinese Cyber Infiltration: US Critical Infrastructure Security and ResilienceImpact & Affect on US Petroleum Manufacturing & Distribution Capabilityhttp://www.dhs.gov/chemical-sector
  • Confidential Icw Presidential Policy Directive/Ppd-21
    Chinese Cyber Infiltration: Emergency Services, Us Critical Infrastructure Security And Resilience
    Confidential Icw Presidential Policy Directive/Ppd-21 Oct 2013 - Oct 2013
    Chinese Cyber Infiltration: US Critical Infrastructure Security and ResilienceImpact & Affect on US Emergency Services Sector Capabilityhttp://www.dhs.gov/emergency-services-sector
  • The University Of Findlay
    Keynote Speaker - Information Assurance Day
    The University Of Findlay Oct 2013 - Oct 2013
    Findlay, Ohio, Us
    Keynote Speaker - Information Assurance DayPresented a series of cyber infiltration topics
  • Rsa Conference Europe
    Opening Keynote Speaker
    Rsa Conference Europe Oct 2013 - Oct 2013
    Opening Keynote Speaker in RSA Conference's Advanced Track: Hacker & Threats HTA-W01Comparative Study: Islamic Republic of Iran, Russia Federation & the People's Republic of China Cyber WarPresentation material included comprehensive research conducted via OSINT, Direct HUMINT and extensive global field experience.
  • Fraud And Corporate Crime Symposium 2013 ~ Queensland Police Service
    Keynote Speaker - The Hacking Forces Emerging From The People'S Republic Of China
    Fraud And Corporate Crime Symposium 2013 ~ Queensland Police Service Sep 2013 - Sep 2013
    Brisbane, Queensland, Au
    Keynote Speaker - The Hacking Forces Emerging from the People's Republic of China @ the Fraud and Corporate Crime Symposium 2013 ~ Queensland Police Service
  • Fraud & Corporate Crime Group (Fccg)
    Advisor
    Fraud & Corporate Crime Group (Fccg) Sep 2013 - Sep 2013
    NOFORN
  • Msp Cmg Fall 2013 Conference Blue Cross And Blue Shield Of Minnesota
    Keynote Speaker - Technolutianary Day
    Msp Cmg Fall 2013 Conference Blue Cross And Blue Shield Of Minnesota Sep 2013 - Sep 2013
    Eagan, Mn, Us
    Keynote Speaker - Technolutianary DayChinese Cyber Espionage: Infiltration via UTF-8 vs UTF-16… the 2 Byte BinaryAgenda ~Current Events…People's Republic of China's ViewWestern View of ChinaCVE’s & MD5 HashesGCCSUTF…Comparing Single vs Double ByteChinese Linux
  • General Dynamics Fidelis Cybersecurity Solutions
    Featured Speaker
    General Dynamics Fidelis Cybersecurity Solutions Sep 2013 - Sep 2013
    Riverside, Ca, Us
    Introduction to the Cultural, Historical, Linguistic, Economic, Political and Military aspects of the People's Republic of China. A review of the dynamics presented in "21st Century Chinese Cyberwarfare" qualified as Strategic Chinese Cyber Infiltration.
  • Hitcon 2013
    Featured Keynote Speaker - International Session: Comparative Study: Iran, Russia & Prc Cyber War
    Hitcon 2013 Jul 2013 - Jul 2013
    Comparative Study: Iran, Russia & PRC Cyber WarNation State Motivations for Using the Cyber Realm – Comparative Study of Islamic Republic of Iran, Russian Federation & the People’s Republic of China (中華人民共和國)…International governments including the Islamic Republic of Iran, Russian Federation and the People’s Republic of China (中華人民共和國) all have very well developed cyber capabilities both offensively and defensively; this is the Western world view. During this presentation a foreigner’s international experience reviewing, studying and researching these three nation states will be presented. Included in this 360 degree review will be both the Western/foreigner’s perspective and the distinct motivations by each country to feel compelled to develop such technologically advanced national security weapons in the information realm.The international lens used to review the nation state cyber weapons platform development will incorporate cultural, historical, linguistic, military, political and technological foci…
  • Cib
    Speaker
    Cib Jul 2013 - Jul 2013
    NOFORN
  • Australian Defence Magazine - 3Rd Annual Cyber Security Summit
    International Keynote - Operation Middle Kingdom People'S Republic Of China Cyber Targeting: Aus
    Australian Defence Magazine - 3Rd Annual Cyber Security Summit Jun 2013 - Jun 2013
    Facts of Chinese history of cyber risk and economic reward as it directly applies to AustraliaFundamental elements of the Official Communist Party, People's Liberation Army and their direct involvement in Chinese Electronic & Information Warfare, specifically related to the Country of Australia will be presented, reviewed and discussed.Distinct cyber rules of engagement in participating with the Chinese State will be presented as well as suggested short and long term moves for future confidential successes in the People's Republic of China. In conclusion, specific recommendations and suggestions for future actions will be offered as well as an opportunity for detailed question and answer.http://www.admevents.com.au/defence-conference/cyber-security-conference
  • Australian Defence Magazine 3Rd Annual Cyber Security Summit
    Workshop Leader: Chinese Cyber Espionage & Operation Middle Kingdom
    Australian Defence Magazine 3Rd Annual Cyber Security Summit Jun 2013 - Jun 2013
    Workshop Leader: Chinese Cyber Espionage & Operation Middle Kingdom Specific Sessions provided to an Australian Defence & Intelligence audience:第一節:共產黨在中國(中共)人民解放軍(解放軍)的關鍵人物Session 1: Key Personalities within the Communist Party of China (CPC) & People‘s Liberation Army (PLA)第二:中國人民共和國表示官方的政策,對信息化綜合網絡電子戰(INEW)Session 2: People’s Republic of China stated official policies on informization & integrated network electronic warfare (INEW)會議三:在中國使用網絡代碼衝突的深入審查 - 15年以上的歷史Session 3: In-depth review of the Chinese use of cyber code conflict - a 15+ year history第四:“沒有限制的戰爭” - 為中國的網絡衝突的原則和交戰規則(淨資產收益率)Session 4: Examination of “War Without Limits” - Principles & Rules of Engagement (ROE) for Chinese Cyber Conflict第五:在中國 境內的黑客是誰?Session 5: Who are the hackers within China?第六: 案例研究在中國網絡間諜 - 各國政府,軍事,情報和經濟目標Session 6: Case Studies in Chinese Cyber Espionage - Governments, Military, Intelligence & Economic Targets第七: 結論的短期和長期移動Session 7: Conclusions with both Short and Long Term Moves
  • Century College Information Technology Association
    Guest Speaker - People'S Republic Of China: Computers & Networks As A Weapons Platform
    Century College Information Technology Association May 2013 - May 2013
    Guest Speaker - People's Republic of China: Computers & Networks as a Weapons Platform
  • Central Ohio Issa
    Keynote Speaker: Military Cyber Command Comparison China, Iran & Russia
    Central Ohio Issa May 2013 - May 2013
    Columbus, Ohio, Us
    Keynote Speaker: Military Cyber Command Comparison People's Republic of China, Islamic Republic of Iran & Russia Federation...contact me for the one page Military Cyber Command Comparison Cheat Sheet
  • M S I Conservatory
    Current Cyber Threat Intelligence Briefing: 中華人民共和國 & 中國人民解放軍
    M S I Conservatory May 2013 - May 2013
    Current Cyber Threat Intelligence Briefing: 中華人民共和國 & 中國人民解放軍(Invitation Only - NOFORN)
  • Secure 360 Security Conference -
    Comparative Study: Iran, Russia & Prc Cyber Conflict (War)
    Secure 360 Security Conference - May 2013 - May 2013
    Comparative Study: Iran, Russia & PRC Cyber Conflict (War)A review of the People's Republic of China, Russian Federation and Islamic Republic of Iran official cyber doctrinal development - through a technical, linguistic, cultural, historical, military, political and geo-strategic threat response perspective.http://secure360.org/schedule/comparative-study-iran-russia-prc-cyber-war/
  • Auscert
    Featured Speaker: People'S Republic Of China Use Of Computers & Networks As A Strategic Weapon
    Auscert May 2013 - May 2013
    Brisbane, Queensland, Au
    Featured Speaker @ AusCERT 2013:China Challenges: Target ~ Australia: People's Republic of China use of Computers & Networks as a Strategic Weapon
  • Auscert
    Cyber Security Speed Debate Panelist
    Auscert May 2013 - May 2013
    Brisbane, Queensland, Au
    Cyber Security Speed Debate Panelist -Debated both positive and negative sides of key cyber security issues related to the People's Republic of China - including political, economic, military, intelligence, historical and linguistic aspects of Operation Middle Kingdom.Fellow debate panelists included:Speed Debating Panel. Chair: Adam Spencer, Mathematician, Comedian and Australian Media PersonalityPanelists: Bill Caelli, Adrian Covich, Mark Fabro, Bill Hagestad, Eugene Kaspersky, Charlie Miller, Scott McIntyre, Marcus Ranum, Jim Watson

Bill H. Education Details

  • College Of Computer Science & Engineering (Cse), University Of Minnesota Graduate School
    College Of Computer Science & Engineering (Cse), University Of Minnesota Graduate School
    Security Technologies - Cyber Warfare & Information Security Emphasis
  • Fbi - Los Angeles Field Office - Infragard
    Fbi - Los Angeles Field Office - Infragard
    Advanced Osint Techniques & Methodologies
  • Sans Technology Institute
    Sans Technology Institute
    Sec487: Open-Source Intelligence (Osint) Gathering And Analysis
  • Fbi - Los Angeles Field Office - Infragard
    Fbi - Los Angeles Field Office - Infragard
    Advanced Osint Techniques (Aot) Level 2
  • Fbi - Los Angeles Field Office - Infragard
    Fbi - Los Angeles Field Office - Infragard
    Advanced Osint Techniques (Aot) Level 3
  • Fbi - Los Angeles Field Office - Infragard
    Fbi - Los Angeles Field Office - Infragard
    Advanced Osint Techniques (Aot) Level 4
  • Fbi - Los Angeles Field Office - Infragard
    Fbi - Los Angeles Field Office - Infragard
    Advanced Osint Techniques (Aot) Level 1
  • Fbi - Los Angeles Field Office - Infragard
    Fbi - Los Angeles Field Office - Infragard
    Open Source Intelligence Sources & Content
  • Fbi - Los Angeles Field Office - Infragard
    Fbi - Los Angeles Field Office - Infragard
    Fundamentals Of Open Source Intelligence - Level 1 Of 6
  • Fbi - Los Angeles Field Office - Infragard
    Fbi - Los Angeles Field Office - Infragard
    Osint
  • Fbi - Los Angeles Field Office - Infragard
    Fbi - Los Angeles Field Office - Infragard
    Open Source Intelligence (Osint) Level 5 Of 6
  • Fbi - Los Angeles Field Office - Infragard
    Fbi - Los Angeles Field Office - Infragard
    Open Source Intelligence (Osint) Level 6 Of 6
  • Fbi - Los Angeles Field Office, Infragard
    Fbi - Los Angeles Field Office, Infragard
    Open Source Intelligence Research & Socmint Level 2 Of 6
  • Sans Technology Institute
    Sans Technology Institute
    Cyber Threat Intelligence (Cti)
  • Usmc Command & Staff College
    Usmc Command & Staff College
    Military Security Policy And Strategy
  • Technological Leadership Institute
    Technological Leadership Institute
    Management Of Technology
  • Usmc Amphibious Warfare School (Aws)
    Usmc Amphibious Warfare School (Aws)
    Amphibious & Expeditionary Warfare Planning & Operations
  • University Of Minnesota
    University Of Minnesota
    Mandarin Chinese; Modern Japanese
  • Nankai University
    Nankai University
    Modern Mandarin Chinese
  • Fbi - Infragard Los Angeles
    Fbi - Infragard Los Angeles
    Intermediate Open Source Intelligence (Osint)

Frequently Asked Questions about Bill H.

What company does Bill H. work for?

Bill H. works for Red Dragon 1949 // 紅龍1949年

What is Bill H.'s role at the current company?

Bill H.'s current role is Chinese Diplomatic, Information and Intelligence, Military and Economic Researcher.

What is Bill H.'s email address?

Bill H.'s email address is ha****@****ing.com

What schools did Bill H. attend?

Bill H. attended College Of Computer Science & Engineering (Cse), University Of Minnesota Graduate School, Fbi - Los Angeles Field Office - Infragard, Sans Technology Institute, Fbi - Los Angeles Field Office - Infragard, Fbi - Los Angeles Field Office - Infragard, Fbi - Los Angeles Field Office - Infragard, Fbi - Los Angeles Field Office - Infragard, Fbi - Los Angeles Field Office - Infragard, Fbi - Los Angeles Field Office - Infragard, Fbi - Los Angeles Field Office - Infragard, Fbi - Los Angeles Field Office - Infragard, Fbi - Los Angeles Field Office - Infragard, Fbi - Los Angeles Field Office, Infragard, Sans Technology Institute, Usmc Command & Staff College, Technological Leadership Institute, Usmc Amphibious Warfare School (Aws), University Of Minnesota, Nankai University, Fbi - Infragard Los Angeles.

Free Chrome Extension

Find emails, phones & company data instantly

Find verified emails from LinkedIn profiles
Get direct phone numbers & mobile contacts
Access company data & employee information
Works directly on LinkedIn - no copy/paste needed
Get Chrome Extension - Free

Aero Online

Your AI prospecting assistant

Download 750 million emails and 100 million phone numbers

Access emails and phone numbers of over 750 million business users. Instantly download verified profiles using 20+ filters, including location, job title, company, function, and industry.